Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 237

Full-Text Articles in Physical Sciences and Mathematics

Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low Jun 2022

Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low

Theses and Dissertations

The Air Force Inspection System is a proponent of utilizing a risk-based sampling strategy (RBSS) for conducting inspections from major command levels down to the unit level. The strategy identifies areas deemed most important or risky by commanders and prioritizes them accordingly for an independent assessment by the Inspector General. While Air Force regulation specifies the need to use a RBSS for inspection, the implementation process is delegated to individual commands and, subsequently, wings. The 23rd Wing, the sponsor for this research, directed us to analyze a RBSS tool highlighted as an example from which to adopt for those units …


Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker May 2022

Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker

All Dissertations

Uranium (U) released from the M-Area at the Department of Energy Savannah River Site into Tims Branch, a seasonal wetland and braided stream system, is estimated to be 43,500 kg between 1965 and 1984. The motivation for this work is the uranium’s persistence in the wetland for decades, where it is estimated that 80% of the U currently remains in the Tims Branch wetland. U has begun to incorporate into wetland iron (Fe) and carbon cycles, associating with local Fe mineralogy and deposits of rich wetland organic matter (OM). The objective of this work is to characterize the chemical phases …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine Nov 2021

Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine

School of Public Service Faculty Publications

Nuisance flooding, or recurrent flooding, occurs during high tide and may be exacerbated when combined with other events such as heavy precipitation, strong winds, or storm surge. Sea level rise has contributed to increased frequency and duration of nuisance flooding in low-lying coastal areas and is causing community-specific impacts such as transportation disruption, road closures, compromises to life and property, overwhelmed storm water systems, and infrastructure damage. This chapter focuses on how drivers respond during nuisance flooding events. Specifically, we discuss how drivers in the Hampton Roads region of southeastern coastal Virginia obtain information about road flooding, how they respond, …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Using An Inventory Of Unstable Slopes To Prioritize Probabilistic Rockfall Modeling And Acid Base Accounting In Great Smoky Mountains National Park, Thomas A. O'Shea Aug 2021

Using An Inventory Of Unstable Slopes To Prioritize Probabilistic Rockfall Modeling And Acid Base Accounting In Great Smoky Mountains National Park, Thomas A. O'Shea

Electronic Theses and Dissertations

An inventory of unstable slopes along transportation corridors and performance modeling are important components of geotechnical asset management in Great Smoky Mountains National Park (GRSM). Hazards and risk were assessed for 285 unstable slopes along 151 miles of roadway. A multi-criteria model was created to select fourteen sites for two-dimensional probabilistic rockfall simulations and Acid Base Accounting (ABA) tests. Simulations indicate that rock material would likely enter the roadway at all fourteen sites. ABA test results indicate that influence of significant acid-producing potential is generally confined to slaty rocks of the Anakeesta Formation and graphitic schist of the Wehutty Formation. …


Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D Jul 2021

Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D

Department of Mathematics: Faculty Publications

Abstract
Is it true that we solve problem using techniques in form of formula? Mathematical formulas can be derived through thinking of a problem or situation. Research has shown that we can create formulas by applying theoretical, technical, and applied knowledge. The knowledge derives from brainstorming and actual experience can be represented by formulas. It is intended that this research article is geared by an audience of average knowledge level of solving mathematics and scientific intricacies. This work details an introductory level of simple, at times complex problems in a mathematical epidermis and computability and solvability in a Computer Science. …


Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin Jul 2021

Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin

Engineering Management & Systems Engineering Theses & Dissertations

Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore, cyber risk management in most businesses depends on qualitative assessments. With the increase in the economic consequences of cyber incidents, the importance of quantifying cyber risks has increased. Cyber risk quantification is also needed to establish communication among decision-makers of different levels of an enterprise, from technical personnel to top management.

The goal of this research is to build a probabilistic cybersecurity risk analysis model that relates attack propagation with impact propagation through internal dependencies and allows temporal analysis.

The contributions of the developed …


Modeling And Solving The Outsourcing Risk Management Problem In Multi-Echelon Supply Chains, Arian A. Nahangi Jun 2021

Modeling And Solving The Outsourcing Risk Management Problem In Multi-Echelon Supply Chains, Arian A. Nahangi

Master's Theses

Worldwide globalization has made supply chains more vulnerable to risk factors, increasing the associated costs of outsourcing goods. Outsourcing is highly beneficial for any company that values building upon its core competencies, but the emergence of the COVID-19 pandemic and other crises have exposed significant vulnerabilities within supply chains. These disruptions forced a shift in the production of goods from outsourcing to domestic methods.

This paper considers a multi-echelon supply chain model with global and domestic raw material suppliers, manufacturing plants, warehouses, and markets. All levels within the supply chain network are evaluated from a holistic perspective, calculating a total …


Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba May 2021

Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba

Theses and Dissertations

Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.

Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …


Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan May 2021

Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan

Doctoral Dissertations

In this last decade, several regulatory frameworks across the world in all modes of transportation had brought fatigue and its risk management in operations to the forefront. Of all transportation modes air travel has been the safest means of transportation. Still as part of continuous improvement efforts, regulators are insisting the operators to adopt strong fatigue science and its foundational principles to reinforce safety risk assessment and management. Fatigue risk management is a data driven system that finds a realistic balance between safety and productivity in an organization. This work discusses the effects of mathematical modeling of fatigue and its …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …


Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires, Yuto Iga, Kazunori Kuwana, Kozo Sekimoto, Yuji Nakamura Feb 2021

Open-Field Scale-Model Experiments Of Fire Whirls Over L-Shaped Line Fires, Yuto Iga, Kazunori Kuwana, Kozo Sekimoto, Yuji Nakamura

Progress in Scale Modeling, an International Journal

This paper presents the results of open-field scale-model experiments of fire-whirl formation over line fires. L-shaped line fires were burned in crosswinds, and the processes of fire-whirl formation were observed. The flame height was measured using an image-processing technique, while two-dimensional velocity components were measured at two different locations using ultrasonic anemometers. Two tests were selected for comparison: test A, in which intense fire whirls repeatedly formed, and test B, in which no whirls were observed. In test A, the wind flow was bent by the fire plume, creating swirling flows near the burning area, thereby forming fire whirls. On …


Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds, Sara Mcallister Feb 2021

Effect Of Reduced Plume Entrainment On The Burning Rate Of Porous Fuel Beds, Sara Mcallister

Progress in Scale Modeling, an International Journal

Large outdoor fires often exhibit unexpected fire behavior, particularly compared with much smaller fires. Understanding the difference between large- and small-scale fires is of importance for both fire behavior predictions and safety. Large fires are often characterized by very tall plumes that can extend to the stratosphere. Particularly as the actively burning area increases, plumes in large-scale fires likely entrain relatively little and may act in a similar fashion to a chimney. To explore the possible changes in burning rate due to the chimney effect, experiments were conducted with wood cribs burned with a chimney of variable height. The burning …


A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments, Ho Yin Ng, Yu Wan, Wan Ki Chow Feb 2021

A Study On Fire Hazards Of Oil Tanks In Urban Areas With Scale Model Experiments, Ho Yin Ng, Yu Wan, Wan Ki Chow

Progress in Scale Modeling, an International Journal

Large fuel tanks are located in an urban area of Tsing Yi in Hong Kong, giving potentially high risks to people living nearby if a fire was to occur. Scale modeling experiments were carried out to investigate the potential of fire hazards. Propanol pool fires with five different scales of oil tanks were studied first. Appropriate tank sizes were then put in a 1/2500 architectural scale model on the Tsing Yi Island to study a fuel tank fire. Results show that the heat and smoke from a fire would affect occupants staying in areas near to the fuel tanks. Fire …


Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano Jan 2021

Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano

VMASC Publications

The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …


A Development Of Disaster Risk Profile In Public Healthcare System During Flood Situation : A Case Study Of Nakhon Sawan City Municipality, Nakhon Sawan Province, Thailand, Kodchakorn Krutphong Jan 2021

A Development Of Disaster Risk Profile In Public Healthcare System During Flood Situation : A Case Study Of Nakhon Sawan City Municipality, Nakhon Sawan Province, Thailand, Kodchakorn Krutphong

Chulalongkorn University Theses and Dissertations (Chula ETD)

This research begins with the idea of the disaster risk assessment included in the disaster management’s well recognized international framework, the Sendai Framework for Disaster Risk Reduction. Then, the idea settles from the risk assessment concept combined with the emergency management knowledge that has the critical infrastructure topic, including the public healthcare system. The flood disaster is the kind of disaster that frequently occurs in Thailand and the study area, Nakhon Sawan City Municipality. Thus, this research aims to study disaster risk profiles in the public healthcare system in a specific local area. The outcome from this research is the …


Incorporating Shear Resistance Into Debris Flow Triggering Model Statistics, Noah J. Lyman Dec 2020

Incorporating Shear Resistance Into Debris Flow Triggering Model Statistics, Noah J. Lyman

Master's Theses

Several regions of the Western United States utilize statistical binary classification models to predict and manage debris flow initiation probability after wildfires. As the occurrence of wildfires and large intensity rainfall events increase, so has the frequency in which development occurs in the steep and mountainous terrain where these events arise. This resulting intersection brings with it an increasing need to derive improved results from existing models, or develop new models, to reduce the economic and human impacts that debris flows may bring. Any development or change to these models could also theoretically increase the ease of collection, processing, and …


Saudi Regime For Ships Source Oil Spill In The Arabian Gulf Preparedness And Response, Abdullah M. Almutairi Nov 2020

Saudi Regime For Ships Source Oil Spill In The Arabian Gulf Preparedness And Response, Abdullah M. Almutairi

World Maritime University Dissertations

No abstract provided.


A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-Gesina Ayoo Nov 2020

A Comparative Study Of The Implementation Of Oil Spill Contingency Planning In Promoting Ocean Sustainability And Governance : A Case Study Of Ghana And Canada., Marvin Bang-Gesina Ayoo

World Maritime University Dissertations

No abstract provided.


Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad Nov 2020

Compliance Assessment Of The National Oil Spill Contingency Plan Of The Philippines On 1990 International Convention On Oil Spill Preparedness, Response And Co-Operation Using Retos, Godofredo Garcia Vagilidad

World Maritime University Dissertations

No abstract provided.


Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf Nov 2020

Assessing Oil Spill Management In Senegal Using The Iso 31000:2018 Standard As A Risk Management Framework, Abdou Aziz Diouf

World Maritime University Dissertations

No abstract provided.


Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao Aug 2020

Research On Quantity Discount Pricing By Container Liner Shipping, Runzhe Zhao

World Maritime University Dissertations

No abstract provided.


Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo Aug 2020

Towards Scaling Laws For Ddt In Obstructed Channels, Elaine S. Oran, Vadim N. Gamezo

Progress in Scale Modeling, an International Journal

In a coal mine, natural gas can leak through walls and accumulate in enclosed regions that are no longer being mined or ventilated. If there is an accidental spark in the region containing this gas, it can ignite a flame that may transition to detonation (DDT). An important problem is to assess if, when, and where DDT can occur, and thus provide information needed to design strong enough barriers to protect active mining areas. We describe results of numerical simulations of flame acceleration and DDT in obstacle-laden channels to find a scaling law for 𝐿DDT, the distance the …


Human Supremacy As Posthuman Risk, Daniel Estrada Jul 2020

Human Supremacy As Posthuman Risk, Daniel Estrada

The Journal of Sociotechnical Critique

Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …


Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei Jun 2020

Design And Test Of An Autonomy Monitoring Service To Detect Divergent Behaviors On Unmanned Aerial Systems, Loay Y. Almannaei

Theses and Dissertations

Operation of Unmanned Aerial Vehicles (UAV) support many critical missions in the United State Air Force (USAF). Monitoring abnormal behavior is one of many responsibilities of the operator during a mission. Some behaviors are hard to be detect by an operator, especially when flying one or more autonomous vehicles; as such, detections require a high level of attention and focus to flight parameters. In this research, a monitoring system and its algorithm are designed and tested for a target fixed-wing UAV. The Autonomy Monitoring Service (AMS) compares the real vehicle or simulated Vehicle with a similar simulated vehicle using Software …


Data-Driven Investment Decisions In P2p Lending: Strategies Of Integrating Credit Scoring And Profit Scoring, Yan Wang Apr 2020

Data-Driven Investment Decisions In P2p Lending: Strategies Of Integrating Credit Scoring And Profit Scoring, Yan Wang

Doctor of Data Science and Analytics Dissertations

In this dissertation, we develop and discuss several loan evaluation methods to guide the investment decisions for peer-to-peer (P2P) lending. In evaluating loans, credit scoring and profit scoring are the two widely utilized approaches. Credit scoring aims at minimizing the risk while profit scoring aims at maximizing the profit. This dissertation addresses the strengths and weaknesses of each scoring method by integrating them in various ways in order to provide the optimal investment suggestions for different investors. Before developing the methods for loan evaluation at the individual level, we applied the state-of-the-art method called the Long Short Term Memory (LSTM) …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …